加入收藏 | 设为首页 | 会员中心 | 我要投稿 李大同 (https://www.lidatong.com.cn/)- 科技、建站、经验、云计算、5G、大数据,站长网!
当前位置: 首页 > 综合聚焦 > 服务器 > Windows > 正文

Windows Azure Beast Exploit

发布时间:2020-12-14 02:22:37 所属栏目:Windows 来源:网络整理
导读:我有一个客户端正在运行PCI兼容性扫描并获得以下内容: BEAST (Browser Exploit Against SSL/TLS) VulnerabilityThe SSL protocol encrypts data by using CBC mode with chainedinitialization vectors. This allows an attacker,which is has gottenaccess
我有一个客户端正在运行PCI兼容性扫描并获得以下内容:

BEAST (Browser Exploit Against SSL/TLS) Vulnerability
The SSL protocol encrypts data by using CBC mode with chained
initialization vectors. This allows an attacker,which is has gotten
access to an HTTPS session via man-in-the-middle (MITM) attacks or other means,to obtain plain text HTTP headers via
a blockwise chosen-boundary attack (BCBA) in conjunction with
Javascript code that uses the HTML5 WebSocket API,the Java
URLConnection API,or the Silverlight WebClient API. This
vulnerability is more commonly referred to as Browser Exploit Against
SSL/TLS or "BEAST".
CVE: CVE-2011-3389
NVD: CVE-2011-3389
Bugtraq: 49778
CVSSv2: AV:N/AC:M/Au:N/C:P/I:N/A:N(4.30)
Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=665814,http://httpd.apache.org/docs/trunk/mod/mod_ssl.html#sslciphersuite,http://technet.microsoft.com/en-us/security/bulletin/ms12-006
Service: http
Evidence:
Cipher Suite: SSLv3 : DES-CBC3-SHA
Cipher Suite: SSLv3 : RC4-SHA
Cipher Suite: SSLv3 : RC4-MD5
Cipher Suite: TLSv1 : AES256-SHA
Cipher Suite: TLSv1 : AES128-SHA
Cipher Suite: TLSv1 : DES-CBC3-SHA
Cipher Suite: TLSv1 : RC4-SHA
Cipher Suite: TLSv1 : RC4-MD5

他们的网站托管在Windows Azure上;既然管理这些服务器有推荐的方法来堵塞这个漏洞吗?

解决方法

你在Azure中运行的是什么?它是Web角色吗? Azure网站?您在IaaS模式下拥有自己的Windows服务器?

如果您正在运行Web角色,您是否正在运行最新的Windows操作系统? Microsoft于2012年4月在Web角色中修补了此问题.

http://msdn.microsoft.com/en-us/library/windowsazure/hh967599.aspx

如果您通过IaaS模式运行Windows Server,则自行负责修补服务器.

(编辑:李大同)

【声明】本站内容均来自网络,其相关言论仅代表作者个人观点,不代表本站立场。若无意侵犯到您的权利,请及时与联系站长删除相关内容!

    推荐文章
      热点阅读